So, NSA can break 64-bit keys
The WSJ article on Clipper II (The Next Day) was the best one. Particularly this line: "Clint Brooks, a technical advisor with the NSA [said] that continued [64-bit] limits [on key length] were needed because officials were "uneasy" about the possibility that software could be altered so that the key would no longer be accessible to law-enforcement officials." This must mean that the Feds figure that by the time this turkey gets around to actually flying (sometime well after the Clinton administration), 64-bit keys will be (are) vulnerable. I guess this means no source code. Are there any software encryption systems that can't be modified after the fact? DCF "Course, the source code could be released after key escrow has occured."
On Aug 19, 6:40, Duncan Frissell wrote:
I guess this means no source code. Are there any software encryption systems that can't be modified after the fact?
Undoubtedly, they'll set things up so that if one modifies the software to break the escrow feature, one won't be able to interoperate with "legitimate" users (i.e. those who haven't disabled the escrow feature). -- Mark Henderson -- markh@wimsey.bc.ca, henderso@netcom.com, mch@squirrel.com PGP 1024/C58015E3 fingerprint=21 F6 AF 2B 6A 8A 0B E1 A1 2A 2A 06 4A D5 92 46 cryptography archive maintainer -- ftp://ftp.wimsey.com/pub/crypto ftp://ftp.netcom.com/pub/he/henderso/change-sun-hostid-1.4.8.tar.gz
participants (2)
-
Duncan Frissell -
Mark C. Henderson